X-Git-Url: https://git.lttng.org/?p=lttng-tools.git;a=blobdiff_plain;f=src%2Fbin%2Flttng-sessiond%2Fevent.c;h=3db3089b66f203d0afbf0aec432933d6a772d3e0;hp=388e688e64e9a831ddd18664df572adca85ca150;hb=6c1c0768320135c6936c371b09731851b508c023;hpb=d14d33bf091e72b23b1f90ea18a0a01bed098b76 diff --git a/src/bin/lttng-sessiond/event.c b/src/bin/lttng-sessiond/event.c index 388e688e6..3db3089b6 100644 --- a/src/bin/lttng-sessiond/event.c +++ b/src/bin/lttng-sessiond/event.c @@ -16,6 +16,7 @@ */ #define _GNU_SOURCE +#define _LGPL_SOURCE #include #include #include @@ -27,49 +28,114 @@ #include "channel.h" #include "event.h" #include "kernel.h" +#include "lttng-sessiond.h" #include "ust-ctl.h" #include "ust-app.h" #include "trace-kernel.h" #include "trace-ust.h" /* - * Setup a lttng_event used to enable *all* syscall tracing. + * Add unique UST event based on the event name, filter bytecode and loglevel. */ -static void init_syscalls_kernel_event(struct lttng_event *event) +static void add_unique_ust_event(struct lttng_ht *ht, + struct ltt_ust_event *event) { - event->name[0] = '\0'; - /* - * We use LTTNG_EVENT* here since the trace kernel creation will make the - * right changes for the kernel. - */ - event->type = LTTNG_EVENT_SYSCALL; + struct cds_lfht_node *node_ptr; + struct ltt_ust_ht_key key; + + assert(ht); + assert(ht->ht); + assert(event); + + key.name = event->attr.name; + key.filter = (struct lttng_filter_bytecode *) event->filter; + key.loglevel = event->attr.loglevel; + key.exclusion = event->exclusion; + + node_ptr = cds_lfht_add_unique(ht->ht, + ht->hash_fct(event->node.key, lttng_ht_seed), + trace_ust_ht_match_event, &key, &event->node.node); + assert(node_ptr == &event->node.node); } /* * Disable kernel tracepoint event for a channel from the kernel session. */ -int event_kernel_disable_tracepoint(struct ltt_kernel_session *ksession, - struct ltt_kernel_channel *kchan, char *event_name) +int event_kernel_disable_tracepoint(struct ltt_kernel_channel *kchan, + char *event_name) { int ret; struct ltt_kernel_event *kevent; + assert(kchan); + kevent = trace_kernel_get_event_by_name(event_name, kchan); if (kevent == NULL) { - ret = LTTCOMM_NO_EVENT; + ret = LTTNG_ERR_NO_EVENT; goto error; } ret = kernel_disable_event(kevent); if (ret < 0) { - ret = LTTCOMM_KERN_DISABLE_FAIL; + ret = LTTNG_ERR_KERN_DISABLE_FAIL; goto error; } DBG("Kernel event %s disable for channel %s.", kevent->event->name, kchan->channel->name); - ret = LTTCOMM_OK; + ret = LTTNG_OK; + +error: + return ret; +} + +/* + * Enable kernel system call for a channel from the kernel session. + */ +int event_kernel_enable_syscall(struct ltt_kernel_channel *kchan, + char *syscall_name) +{ + int ret; + + assert(kchan); + + ret = kernel_enable_syscall(syscall_name, kchan); + if (ret < 0) { + ret = LTTNG_ERR_KERN_ENABLE_FAIL; + goto error; + } + + DBG("Kernel event %s enable for channel %s.", + syscall_name, kchan->channel->name); + + ret = LTTNG_OK; + +error: + return ret; +} + +/* + * Disable kernel system call for a channel from the kernel session. + */ +int event_kernel_disable_syscall(struct ltt_kernel_channel *kchan, + char *syscall_name) +{ + int ret; + + assert(kchan); + + ret = kernel_disable_syscall(syscall_name, kchan); + if (ret < 0) { + ret = LTTNG_ERR_KERN_DISABLE_FAIL; + goto error; + } + + DBG("Kernel syscall %s disable for channel %s.", + syscall_name[0] == '\0' ? "" : syscall_name, + kchan->channel->name); + + ret = LTTNG_OK; error: return ret; @@ -78,12 +144,13 @@ error: /* * Disable kernel tracepoint events for a channel from the kernel session. */ -int event_kernel_disable_all_tracepoints(struct ltt_kernel_session *ksession, - struct ltt_kernel_channel *kchan) +int event_kernel_disable_all_tracepoints(struct ltt_kernel_channel *kchan) { int ret; struct ltt_kernel_event *kevent; + assert(kchan); + /* For each event in the kernel session */ cds_list_for_each_entry(kevent, &kchan->events_list.head, list) { ret = kernel_disable_event(kevent); @@ -92,63 +159,68 @@ int event_kernel_disable_all_tracepoints(struct ltt_kernel_session *ksession, continue; } } - ret = LTTCOMM_OK; + ret = LTTNG_OK; return ret; } -/* - * Disable kernel syscall events for a channel from the kernel session. - */ -int event_kernel_disable_all_syscalls(struct ltt_kernel_session *ksession, - struct ltt_kernel_channel *kchan) -{ - ERR("Cannot disable syscall tracing for existing session. Please destroy session instead."); - return LTTCOMM_OK; /* Return OK so disable all succeeds */ -} - /* * Disable all kernel event for a channel from the kernel session. */ -int event_kernel_disable_all(struct ltt_kernel_session *ksession, - struct ltt_kernel_channel *kchan) +int event_kernel_disable_all(struct ltt_kernel_channel *kchan) { int ret; - ret = event_kernel_disable_all_tracepoints(ksession, kchan); - if (ret != LTTCOMM_OK) + assert(kchan); + + ret = event_kernel_disable_all_tracepoints(kchan); + if (ret != LTTNG_OK) return ret; - ret = event_kernel_disable_all_syscalls(ksession, kchan); + ret = event_kernel_disable_syscall(kchan, ""); return ret; } /* * Enable kernel tracepoint event for a channel from the kernel session. */ -int event_kernel_enable_tracepoint(struct ltt_kernel_session *ksession, - struct ltt_kernel_channel *kchan, struct lttng_event *event) +int event_kernel_enable_tracepoint(struct ltt_kernel_channel *kchan, + struct lttng_event *event) { int ret; struct ltt_kernel_event *kevent; + assert(kchan); + assert(event); + kevent = trace_kernel_get_event_by_name(event->name, kchan); if (kevent == NULL) { ret = kernel_create_event(event, kchan); if (ret < 0) { - if (ret == -EEXIST) { - ret = LTTCOMM_KERN_EVENT_EXIST; - } else { - ret = LTTCOMM_KERN_ENABLE_FAIL; + switch (-ret) { + case EEXIST: + ret = LTTNG_ERR_KERN_EVENT_EXIST; + break; + case ENOSYS: + ret = LTTNG_ERR_KERN_EVENT_ENOSYS; + break; + default: + ret = LTTNG_ERR_KERN_ENABLE_FAIL; + break; } goto end; } } else if (kevent->enabled == 0) { ret = kernel_enable_event(kevent); if (ret < 0) { - ret = LTTCOMM_KERN_ENABLE_FAIL; + ret = LTTNG_ERR_KERN_ENABLE_FAIL; goto end; } + } else { + /* At this point, the event is considered enabled */ + ret = LTTNG_ERR_KERN_EVENT_EXIST; + goto end; } - ret = LTTCOMM_OK; + + ret = LTTNG_OK; end: return ret; } @@ -156,13 +228,15 @@ end: /* * Enable all kernel tracepoint events of a channel of the kernel session. */ -int event_kernel_enable_all_tracepoints(struct ltt_kernel_session *ksession, - struct ltt_kernel_channel *kchan, int kernel_tracer_fd) +int event_kernel_enable_all_tracepoints(struct ltt_kernel_channel *kchan, + int kernel_tracer_fd) { int size, i, ret; struct ltt_kernel_event *kevent; struct lttng_event *event_list = NULL; + assert(kchan); + /* For each event in the kernel session */ cds_list_for_each_entry(kevent, &kchan->events_list.head, list) { if (kevent->enabled == 0) { @@ -176,7 +250,7 @@ int event_kernel_enable_all_tracepoints(struct ltt_kernel_session *ksession, size = kernel_list_events(kernel_tracer_fd, &event_list); if (size < 0) { - ret = LTTCOMM_KERN_LIST_FAIL; + ret = LTTNG_ERR_KERN_LIST_FAIL; goto end; } @@ -194,55 +268,39 @@ int event_kernel_enable_all_tracepoints(struct ltt_kernel_session *ksession, } free(event_list); - ret = LTTCOMM_OK; + ret = LTTNG_OK; end: return ret; - } /* - * Enable all kernel tracepoint events of a channel of the kernel session. + * Enable all kernel events of a channel of the kernel session. */ -int event_kernel_enable_all_syscalls(struct ltt_kernel_session *ksession, - struct ltt_kernel_channel *kchan, int kernel_tracer_fd) +int event_kernel_enable_all(struct ltt_kernel_channel *kchan, + int kernel_tracer_fd) { - int ret; - struct lttng_event event; - - init_syscalls_kernel_event(&event); + int tp_ret; - DBG("Enabling all syscall tracing"); + assert(kchan); - ret = kernel_create_event(&event, kchan); - if (ret < 0) { - if (ret == -EEXIST) { - ret = LTTCOMM_KERN_EVENT_EXIST; - } else { - ret = LTTCOMM_KERN_ENABLE_FAIL; - } + tp_ret = event_kernel_enable_all_tracepoints(kchan, kernel_tracer_fd); + if (tp_ret != LTTNG_OK) { goto end; } - ret = LTTCOMM_OK; -end: - return ret; -} - -/* - * Enable all kernel events of a channel of the kernel session. - */ -int event_kernel_enable_all(struct ltt_kernel_session *ksession, - struct ltt_kernel_channel *kchan, int kernel_tracer_fd) -{ - int ret; + /* + * Reaching this code path means that all tracepoints were enabled without + * errors so we ignore the error value of syscalls. + * + * At the moment, failing to enable syscalls on "lttng enable-event -a -k" + * is not considered an error that need to be returned to the client since + * tracepoints did not fail. Future work will allow us to send back + * multiple errors to the client in one API call. + */ + (void) event_kernel_enable_syscall(kchan, ""); - ret = event_kernel_enable_all_tracepoints(ksession, kchan, kernel_tracer_fd); - if (ret != LTTCOMM_OK) { - goto end; - } - ret = event_kernel_enable_all_syscalls(ksession, kchan, kernel_tracer_fd); end: - return ret; + return tp_ret; } /* @@ -254,178 +312,170 @@ end: /* * Enable all UST tracepoints for a channel from a UST session. */ -int event_ust_enable_all_tracepoints(struct ltt_ust_session *usess, int domain, - struct ltt_ust_channel *uchan) +int event_ust_enable_all_tracepoints(struct ltt_ust_session *usess, + struct ltt_ust_channel *uchan, + char *filter_expression, + struct lttng_filter_bytecode *filter) { - int ret, i; - size_t size; + int ret, i, size; struct lttng_ht_iter iter; struct ltt_ust_event *uevent = NULL; struct lttng_event *events = NULL; - switch (domain) { - case LTTNG_DOMAIN_UST: - { - /* Enable existing events */ - cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent, - node.node) { - if (uevent->enabled == 0) { - ret = ust_app_enable_event_glb(usess, uchan, uevent); - if (ret < 0) { - continue; - } - uevent->enabled = 1; - } - } + assert(usess); + assert(uchan); - /* Get all UST available events */ - size = ust_app_list_events(&events); - if (size < 0) { - ret = LTTCOMM_UST_LIST_FAIL; - goto error; - } + rcu_read_lock(); - for (i = 0; i < size; i++) { - /* - * Check if event exist and if so, continue since it was enable - * previously. - */ - uevent = trace_ust_find_event_by_name(uchan->events, - events[i].name); - if (uevent != NULL) { - ret = ust_app_enable_event_pid(usess, uchan, uevent, - events[i].pid); - if (ret < 0) { - if (ret != -EEXIST) { - ret = LTTCOMM_UST_ENABLE_FAIL; - goto error; - } - } + /* Enable existing events */ + cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent, + node.node) { + if (uevent->enabled == 0) { + ret = ust_app_enable_event_glb(usess, uchan, uevent); + if (ret < 0) { continue; } + uevent->enabled = 1; + } + } - /* Create ust event */ - uevent = trace_ust_create_event(&events[i]); - if (uevent == NULL) { - ret = LTTCOMM_FATAL; - goto error_destroy; - } + /* Get all UST available events */ + size = ust_app_list_events(&events); + if (size < 0) { + ret = LTTNG_ERR_UST_LIST_FAIL; + goto error; + } - /* Create event for the specific PID */ + for (i = 0; i < size; i++) { + /* + * Check if event exist and if so, continue since it was enable + * previously. + */ + uevent = trace_ust_find_event(uchan->events, events[i].name, filter, + events[i].loglevel, NULL); + if (uevent != NULL) { ret = ust_app_enable_event_pid(usess, uchan, uevent, events[i].pid); if (ret < 0) { - if (ret == -EEXIST) { - ret = LTTCOMM_UST_EVENT_EXIST; + if (ret != -LTTNG_UST_ERR_EXIST) { + ret = LTTNG_ERR_UST_ENABLE_FAIL; goto error; - } else { - ret = LTTCOMM_UST_ENABLE_FAIL; - goto error_destroy; } } + continue; + } - uevent->enabled = 1; - /* Add ltt ust event to channel */ - rcu_read_lock(); - lttng_ht_add_unique_str(uchan->events, &uevent->node); - rcu_read_unlock(); + /* Create ust event */ + uevent = trace_ust_create_event(&events[i], filter_expression, + filter, NULL); + if (uevent == NULL) { + ret = LTTNG_ERR_FATAL; + goto error_destroy; } - free(events); - break; - } -#if 0 - case LTTNG_DOMAIN_UST_EXEC_NAME: - case LTTNG_DOMAIN_UST_PID: - case LTTNG_DOMAIN_UST_PID_FOLLOW_CHILDREN: -#endif - default: - ret = LTTCOMM_UND; - goto error; + /* Create event for the specific PID */ + ret = ust_app_enable_event_pid(usess, uchan, uevent, + events[i].pid); + if (ret < 0) { + if (ret == -LTTNG_UST_ERR_EXIST) { + ret = LTTNG_ERR_UST_EVENT_EXIST; + goto error; + } else { + ret = LTTNG_ERR_UST_ENABLE_FAIL; + goto error_destroy; + } + } + + uevent->enabled = 1; + /* Add ltt ust event to channel */ + rcu_read_lock(); + add_unique_ust_event(uchan->events, uevent); + rcu_read_unlock(); } + free(events); - return LTTCOMM_OK; + rcu_read_unlock(); + return LTTNG_OK; error_destroy: trace_ust_destroy_event(uevent); error: free(events); + rcu_read_unlock(); return ret; } /* * Enable UST tracepoint event for a channel from a UST session. */ -int event_ust_enable_tracepoint(struct ltt_ust_session *usess, int domain, - struct ltt_ust_channel *uchan, struct lttng_event *event) +int event_ust_enable_tracepoint(struct ltt_ust_session *usess, + struct ltt_ust_channel *uchan, struct lttng_event *event, + char *filter_expression, + struct lttng_filter_bytecode *filter, + struct lttng_event_exclusion *exclusion) { - int ret = LTTCOMM_OK, to_create = 0; + int ret = LTTNG_OK, to_create = 0; struct ltt_ust_event *uevent; - uevent = trace_ust_find_event_by_name(uchan->events, event->name); + assert(usess); + assert(uchan); + assert(event); + + rcu_read_lock(); + + uevent = trace_ust_find_event(uchan->events, event->name, filter, + event->loglevel, exclusion); if (uevent == NULL) { - uevent = trace_ust_create_event(event); + uevent = trace_ust_create_event(event, filter_expression, + filter, exclusion); if (uevent == NULL) { - ret = LTTCOMM_FATAL; + ret = LTTNG_ERR_UST_ENABLE_FAIL; goto error; } + /* Valid to set it after the goto error since uevent is still NULL */ to_create = 1; } if (uevent->enabled) { /* It's already enabled so everything is OK */ + ret = LTTNG_ERR_UST_EVENT_ENABLED; goto end; } uevent->enabled = 1; - switch (domain) { - case LTTNG_DOMAIN_UST: - { - if (to_create) { - /* Create event on all UST registered apps for session */ - ret = ust_app_create_event_glb(usess, uchan, uevent); - } else { - /* Enable event on all UST registered apps for session */ - ret = ust_app_enable_event_glb(usess, uchan, uevent); - } + if (to_create) { + /* Create event on all UST registered apps for session */ + ret = ust_app_create_event_glb(usess, uchan, uevent); + } else { + /* Enable event on all UST registered apps for session */ + ret = ust_app_enable_event_glb(usess, uchan, uevent); + } - if (ret < 0) { - if (ret == -EEXIST) { - ret = LTTCOMM_UST_EVENT_EXIST; - goto end; - } else { - ret = LTTCOMM_UST_ENABLE_FAIL; - goto error; - } + if (ret < 0) { + if (ret == -LTTNG_UST_ERR_EXIST) { + ret = LTTNG_ERR_UST_EVENT_EXIST; + goto end; + } else { + ret = LTTNG_ERR_UST_ENABLE_FAIL; + goto error; } - break; - } -#if 0 - case LTTNG_DOMAIN_UST_EXEC_NAME: - case LTTNG_DOMAIN_UST_PID: - case LTTNG_DOMAIN_UST_PID_FOLLOW_CHILDREN: -#endif - default: - ret = LTTCOMM_UND; - goto end; } if (to_create) { - rcu_read_lock(); /* Add ltt ust event to channel */ - lttng_ht_add_unique_str(uchan->events, &uevent->node); - rcu_read_unlock(); + add_unique_ust_event(uchan->events, uevent); } DBG("Event UST %s %s in channel %s", uevent->attr.name, to_create ? "created" : "enabled", uchan->name); - ret = LTTCOMM_OK; + ret = LTTNG_OK; end: + rcu_read_unlock(); return ret; error: @@ -440,124 +490,391 @@ error: /* In this code path, the uevent was not added to the hash table */ trace_ust_destroy_event(uevent); } + rcu_read_unlock(); return ret; } /* * Disable UST tracepoint of a channel from a UST session. */ -int event_ust_disable_tracepoint(struct ltt_ust_session *usess, int domain, +int event_ust_disable_tracepoint(struct ltt_ust_session *usess, struct ltt_ust_channel *uchan, char *event_name) { int ret; struct ltt_ust_event *uevent; + struct lttng_ht_node_str *node; + struct lttng_ht_iter iter; + struct lttng_ht *ht; - uevent = trace_ust_find_event_by_name(uchan->events, event_name); - if (uevent == NULL) { - ret = LTTCOMM_UST_EVENT_NOT_FOUND; + assert(usess); + assert(uchan); + assert(event_name); + + ht = uchan->events; + + rcu_read_lock(); + + /* + * We use a custom lookup since we need the iterator for the next_duplicate + * call in the do while loop below. + */ + cds_lfht_lookup(ht->ht, ht->hash_fct((void *) event_name, lttng_ht_seed), + trace_ust_ht_match_event_by_name, event_name, &iter.iter); + node = lttng_ht_iter_get_node_str(&iter); + if (node == NULL) { + DBG2("Trace UST event NOT found by name %s", event_name); + ret = LTTNG_ERR_UST_EVENT_NOT_FOUND; goto error; } - if (uevent->enabled == 0) { - /* It's already enabled so everything is OK */ - ret = LTTCOMM_OK; - goto end; - } + do { + uevent = caa_container_of(node, struct ltt_ust_event, node); + assert(uevent); + + if (uevent->enabled == 0) { + /* It's already disabled so everything is OK */ + goto next; + } - switch (domain) { - case LTTNG_DOMAIN_UST: ret = ust_app_disable_event_glb(usess, uchan, uevent); - if (ret < 0 && ret != -EEXIST) { - ret = LTTCOMM_UST_DISABLE_FAIL; + if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) { + ret = LTTNG_ERR_UST_DISABLE_FAIL; goto error; } - break; -#if 0 - case LTTNG_DOMAIN_UST_EXEC_NAME: - case LTTNG_DOMAIN_UST_PID: - case LTTNG_DOMAIN_UST_PID_FOLLOW_CHILDREN: -#endif - default: - ret = LTTCOMM_UND; - goto error; - } + uevent->enabled = 0; - uevent->enabled = 0; - ret = LTTCOMM_OK; + DBG2("Event UST %s disabled in channel %s", uevent->attr.name, + uchan->name); -end: - DBG2("Event UST %s disabled in channel %s", uevent->attr.name, - uchan->name); +next: + /* Get next duplicate event by name. */ + cds_lfht_next_duplicate(ht->ht, trace_ust_ht_match_event_by_name, + event_name, &iter.iter); + node = lttng_ht_iter_get_node_str(&iter); + } while (node); + + ret = LTTNG_OK; error: + rcu_read_unlock(); return ret; } /* * Disable all UST tracepoints for a channel from a UST session. */ -int event_ust_disable_all_tracepoints(struct ltt_ust_session *usess, int domain, +int event_ust_disable_all_tracepoints(struct ltt_ust_session *usess, struct ltt_ust_channel *uchan) { - int ret, i; - size_t size; + int ret, i, size; struct lttng_ht_iter iter; struct ltt_ust_event *uevent = NULL; struct lttng_event *events = NULL; - switch (domain) { - case LTTNG_DOMAIN_UST: - { - /* Disabling existing events */ - cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent, - node.node) { - if (uevent->enabled == 1) { - ret = ust_app_disable_event_glb(usess, uchan, uevent); - if (ret < 0) { - continue; - } - uevent->enabled = 0; + assert(usess); + assert(uchan); + + rcu_read_lock(); + + /* Disabling existing events */ + cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent, + node.node) { + if (uevent->enabled == 1) { + ret = event_ust_disable_tracepoint(usess, uchan, + uevent->attr.name); + if (ret < 0) { + continue; } } + } - /* Get all UST available events */ - size = ust_app_list_events(&events); - if (size < 0) { - ret = LTTCOMM_UST_LIST_FAIL; - goto error; + /* Get all UST available events */ + size = ust_app_list_events(&events); + if (size < 0) { + ret = LTTNG_ERR_UST_LIST_FAIL; + goto error; + } + + for (i = 0; i < size; i++) { + ret = event_ust_disable_tracepoint(usess, uchan, + events[i].name); + if (ret != LTTNG_OK) { + /* Continue to disable the rest... */ + continue; } + } + free(events); - for (i = 0; i < size; i++) { - uevent = trace_ust_find_event_by_name(uchan->events, - events[i].name); - if (uevent != NULL && uevent->enabled == 1) { - ret = ust_app_disable_event_pid(usess, uchan, uevent, - events[i].pid); - if (ret < 0 && ret != -EEXIST) { - ret = LTTCOMM_UST_DISABLE_FAIL; - goto error; - } - uevent->enabled = 0; - continue; - } + rcu_read_unlock(); + return LTTNG_OK; + +error: + free(events); + rcu_read_unlock(); + return ret; +} + +/* + * Enable all agent event for a given UST session. + * + * Return LTTNG_OK on success or else a LTTNG_ERR* code. + */ +int event_agent_enable_all(struct ltt_ust_session *usess, + struct agent *agt, struct lttng_event *event, + struct lttng_filter_bytecode *filter) +{ + int ret; + struct agent_event *aevent; + struct lttng_ht_iter iter; + + assert(usess); + + DBG("Event agent enabling ALL events for session %" PRIu64, usess->id); + + /* Enable event on agent application through TCP socket. */ + ret = event_agent_enable(usess, agt, event, filter); + if (ret != LTTNG_OK) { + goto error; + } + + /* Flag every event that they are now enabled. */ + rcu_read_lock(); + cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent, + node.node) { + aevent->enabled = 1; + } + rcu_read_unlock(); + + ret = LTTNG_OK; + +error: + return ret; +} + +/* + * Enable a single agent event for a given UST session. + * + * Return LTTNG_OK on success or else a LTTNG_ERR* code. + */ +int event_agent_enable(struct ltt_ust_session *usess, + struct agent *agt, struct lttng_event *event, + struct lttng_filter_bytecode *filter) +{ + int ret, created = 0; + struct agent_event *aevent; + + assert(usess); + assert(event); + assert(agt); + + DBG("Event agent enabling %s for session %" PRIu64 " with loglevel type %d " + "and loglevel %d", event->name, usess->id, event->loglevel_type, + event->loglevel); + + aevent = agent_find_event(event->name, event->loglevel, agt); + if (!aevent) { + aevent = agent_create_event(event->name, filter); + if (!aevent) { + ret = LTTNG_ERR_NOMEM; + goto error; } + aevent->loglevel = event->loglevel; + aevent->loglevel_type = event->loglevel_type; + created = 1; + } - free(events); - break; + /* Already enabled? */ + if (aevent->enabled) { + goto end; } -#if 0 - case LTTNG_DOMAIN_UST_EXEC_NAME: - case LTTNG_DOMAIN_UST_PID: - case LTTNG_DOMAIN_UST_PID_FOLLOW_CHILDREN: -#endif + + ret = agent_enable_event(aevent, agt->domain); + if (ret != LTTNG_OK) { + goto error; + } + + /* If the event was created prior to the enable, add it to the domain. */ + if (created) { + agent_add_event(aevent, agt); + } + +end: + return LTTNG_OK; + +error: + if (created) { + agent_destroy_event(aevent); + } + return ret; +} + +/* + * Return the agent default event name to use by testing if the process is root + * or not. Return NULL on error. + */ +const char *event_get_default_agent_ust_name(enum lttng_domain_type domain) +{ + const char *default_event_name = NULL; + + switch (domain) { + case LTTNG_DOMAIN_LOG4J: + if (is_root) { + default_event_name = DEFAULT_SYS_LOG4J_EVENT_NAME; + } else { + default_event_name = DEFAULT_USER_LOG4J_EVENT_NAME; + } + break; + case LTTNG_DOMAIN_JUL: + if (is_root) { + default_event_name = DEFAULT_SYS_JUL_EVENT_NAME; + } else { + default_event_name = DEFAULT_USER_JUL_EVENT_NAME; + } + break; + case LTTNG_DOMAIN_PYTHON: + default_event_name = DEFAULT_USER_PYTHON_EVENT_NAME; + break; default: - ret = LTTCOMM_UND; + assert(0); + } + + return default_event_name; +} + +/* + * Disable a single agent event for a given UST session. + * + * Return LTTNG_OK on success or else a LTTNG_ERR* code. + */ +int event_agent_disable(struct ltt_ust_session *usess, struct agent *agt, + char *event_name) +{ + int ret; + struct agent_event *aevent; + struct ltt_ust_event *uevent = NULL; + struct ltt_ust_channel *uchan = NULL; + const char *ust_event_name, *ust_channel_name; + + assert(agt); + assert(usess); + assert(event_name); + + DBG("Event agent disabling %s for session %" PRIu64, event_name, usess->id); + + aevent = agent_find_event_by_name(event_name, agt); + if (!aevent) { + ret = LTTNG_ERR_UST_EVENT_NOT_FOUND; + goto error; + } + + /* Already disabled? */ + if (!aevent->enabled) { + goto end; + } + + if (agt->domain == LTTNG_DOMAIN_JUL) { + ust_channel_name = DEFAULT_JUL_CHANNEL_NAME; + } else if (agt->domain == LTTNG_DOMAIN_LOG4J) { + ust_channel_name = DEFAULT_LOG4J_CHANNEL_NAME; + } else if (agt->domain == LTTNG_DOMAIN_PYTHON) { + ust_channel_name = DEFAULT_PYTHON_CHANNEL_NAME; + } else { + ret = LTTNG_ERR_INVALID; + goto error; + } + + /* + * Disable it on the UST side. First get the channel reference then find + * the event and finally disable it. + */ + uchan = trace_ust_find_channel_by_name(usess->domain_global.channels, + (char *) ust_channel_name); + if (!uchan) { + ret = LTTNG_ERR_UST_CHAN_NOT_FOUND; goto error; } - return LTTCOMM_OK; + ust_event_name = event_get_default_agent_ust_name(agt->domain); + if (!ust_event_name) { + ret = LTTNG_ERR_FATAL; + goto error; + } + + /* + * The loglevel is hardcoded with 0 here since the agent ust event is set + * with the loglevel type to ALL thus the loglevel stays 0. The event's + * filter is the one handling the loglevel for agent. + */ + uevent = trace_ust_find_event(uchan->events, (char *) ust_event_name, + aevent->filter, 0, NULL); + /* If the agent event exists, it must be available on the UST side. */ + assert(uevent); + + ret = ust_app_disable_event_glb(usess, uchan, uevent); + if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) { + ret = LTTNG_ERR_UST_DISABLE_FAIL; + goto error; + } + + /* + * Flag event that it's disabled so the shadow copy on the ust app side + * will disable it if an application shows up. + */ + uevent->enabled = 0; + + ret = agent_disable_event(aevent, agt->domain); + if (ret != LTTNG_OK) { + goto error; + } + +end: + return LTTNG_OK; + +error: + return ret; +} +/* + * Disable all agent event for a given UST session. + * + * Return LTTNG_OK on success or else a LTTNG_ERR* code. + */ +int event_agent_disable_all(struct ltt_ust_session *usess, + struct agent *agt) +{ + int ret; + struct agent_event *aevent; + struct lttng_ht_iter iter; + + assert(agt); + assert(usess); + + /* + * Disable event on agent application. Continue to disable all other events + * if the * event is not found. + */ + ret = event_agent_disable(usess, agt, "*"); + if (ret != LTTNG_OK && ret != LTTNG_ERR_UST_EVENT_NOT_FOUND) { + goto error; + } + + /* Flag every event that they are now enabled. */ + rcu_read_lock(); + cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent, + node.node) { + if (!aevent->enabled) { + continue; + } + + ret = event_agent_disable(usess, agt, aevent->name); + if (ret != LTTNG_OK) { + rcu_read_unlock(); + goto error; + } + } + rcu_read_unlock(); + + ret = LTTNG_OK; error: - free(events); return ret; }